Securing the new network architecture

In modern networks, security is less about locking down a perimeter and more about controlling access and behavior and ensuring data safety in a dynamic and mobile environment.

The distributed nature of modern networks, combined with the increased focus on applications and business data, makes network security less about locking down a network perimeter and more about controlling user access and behavior and ensuring data safety in a dynamic and mobile environment. Network access control (NAC) is being promoted as the model to which enterprises should aspire, but few are taking the plunge to a full NAC implementation. This ebook chapter discusses intermediate steps you can take toward NAC now and explore alternative best-of-breed approaches. It also examines how to simplify your security architecture with all-in-one and integrated products that offer heightened levels of traffic control and looks at new technologies that consolidate network and security management for optimum network/security traffic analysis.

Read about:

  • Network access control
  • Endpoint security
  • SSL VPNs
  • Application firewalls
  • Unified threat management
  • Security-enabled network hardware
  • Monitoring controls for network security and performance

Download the chapter now

This was last published in July 2008

Dig Deeper on Network Security Best Practices and Products

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close